会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Secure communication method and apparatus
    • 安全通信方式和设备
    • US5515441A
    • 1996-05-07
    • US241534
    • 1994-05-12
    • David W. Faucher
    • David W. Faucher
    • H04L9/08H04L9/32H04L9/30
    • H04L9/0841H04L9/3263
    • In a communication system in which a node may communicate over insecure channels with any of a plurality of terminals and may pass messages from any of the terminals to any other of the terminals, communication is secured by computing a first cryptovariable from information associated with certificates exchanged between the node and a terminal, computing a second cryptovariable from a prior-art public key exchange, and computing a session cryptovariable as a function of the first and second cryptovariables. This can be done asymmetrically, enabling a terminal to verify the security of an unattended node.
    • 在其中节点可以通过不安全信道与多个终端中的任何一个进行通信的通信系统中,并且可以将消息从任何终端传递到终端的任何终端,通过从与交换的证书相关联的信息计算第一密码变量来保证通信 在所述节点和终端之间,计算来自现有公共密钥交换的第二密码变量,以及根据所述第一和第二密码变量计算会话密码变量。 这可以不对称地完成,使得终端能够验证无人值守节点的安全性。
    • 4. 发明授权
    • Method of data path switching during inter-radio access technology handover
    • 无线电接入技术切换期间的数据路径切换方法
    • US08737354B2
    • 2014-05-27
    • US12987308
    • 2011-01-10
    • David W. FaucherEdward Grinshpun
    • David W. FaucherEdward Grinshpun
    • H04W4/00
    • H04W36/02H04W36/0055
    • The present invention provides a method of data path switching. Embodiments of the method include transmitting a packet from a node in a communication system during hand off of a mobile node from a source access network to a target access network. The packet includes an end marker that indicates that the packet is the last packet to be transmitted during the hand off over a source link between the mobile node and an anchor node via the source access network during the hand off. Embodiments of the method also include switching, at the node, a transmission data path from the source link to a target link between the mobile node and the anchor node via the target access network following transmission of the packet including the end marker.
    • 本发明提供一种数据路径切换的方法。 该方法的实施例包括:在将移动节点从源接入网切换到目标接入网络期间,在通信系统中的节点发送分组。 分组包括结束标记,其指示在切换期间,分组是在通过源接入网络的移动节点和锚节点之间的源链路切换期间要发送的最后一个分组。 该方法的实施例还包括在发送包括结束标记的分组之后经由目标接入网在节点处切换从源链路到移动节点和锚节点之间的目标链路的传输数据路径。
    • 5. 发明申请
    • METHOD OF DATA PATH SWITCHING DURING INTER-RADIO ACCESS TECHNOLOGY HANDOVER
    • 无线电接入技术切换期间数据路径切换的方法
    • US20120177002A1
    • 2012-07-12
    • US12987308
    • 2011-01-10
    • David W. FaucherEdward Grinshpun
    • David W. FaucherEdward Grinshpun
    • H04W36/00
    • H04W36/02H04W36/0055
    • The present invention provides a method of data path switching. Embodiments of the method include transmitting a packet from a node in a communication system during hand off of a mobile node from a source access network to a target access network. The packet includes an end marker that indicates that the packet is the last packet to be transmitted during the hand off over a source link between the mobile node and an anchor node via the source access network during the hand off. Embodiments of the method also include switching, at the node, a transmission data path from the source link to a target link between the mobile node and the anchor node via the target access network following transmission of the packet including the end marker.
    • 本发明提供一种数据路径切换的方法。 该方法的实施例包括:在将移动节点从源接入网切换到目标接入网络期间,在通信系统中的节点发送分组。 分组包括结束标记,其指示在切换期间,分组是在通过源接入网络的移动节点和锚节点之间的源链路切换期间要发送的最后一个分组。 该方法的实施例还包括在发送包括结束标记的分组之后经由目标接入网在节点处切换从源链路到移动节点和锚节点之间的目标链路的传输数据路径。
    • 6. 发明授权
    • Data encryption key management system
    • 数据加密密钥管理系统
    • US06577734B1
    • 2003-06-10
    • US08550909
    • 1995-10-31
    • Mark H. EtzelDavid W. FaucherDaniel Nelson HeerDavid P. MaherRobert John Rance
    • Mark H. EtzelDavid W. FaucherDaniel Nelson HeerDavid P. MaherRobert John Rance
    • H04L900
    • H04L9/0822H04L9/0838H04L9/0894
    • The secure management of encryption keys is obtained by preventing external access thereto and ensuring that the keys do not leave an encryption unit in their original form. This result is obtained via a facility which (a) generates a unique device encryption key and at least one program encryption key, (b) encrypts the program encryption key using the device encryption key, and (c) stores the result in local memory. Thereafter, responsive to receipt of an indication to encrypt data, the program encryption key is retrieved from memory and is decrypted using the unique device encryption key. The data is then encrypted using the decrypted program encryption key and the encrypted data is stored in a server for distribution to a user who enters a request for the data. When there is a need to transport the latter key to another element, then the program key is encrypted using a symmetrical encryption key that the facility shares with the other element and the result is supplied to that element. The element then decrypts the encrypted program key using its own version of the symmetrical key.
    • 通过防止外部访问并确保密钥不以其原始形式离开加密单元来获得加密密钥的安全管理。 该结果通过(a)生成唯一的设备加密密钥和至少一个程序加密密钥的设施获得,(b)使用设备加密密钥对程序加密密钥进行加密,以及(c)将结果存储在本地存储器中。 此后,响应于接收到加密数据的指示,从存储器检索程序加密密钥,并使用唯一的设备加密密钥进行解密。 然后使用解密的程序加密密钥对数据进行加密,并且将加密的数据存储在服务器中以分发给输入对数据的请求的用户。 当需要将后一个密钥传输到另一个元素时,程序密钥使用设备与其他元素共享的对称加密密钥进行加密,并将结果提供给该元素。 该元素然后使用其自己的版本的对称密钥解密加密的程序密钥。
    • 7. 发明授权
    • Secure telecommunications
    • 安全通信
    • US5455861A
    • 1995-10-03
    • US113155
    • 1993-08-27
    • David W. FaucherDaniel N. HeerMichael M. KaplanDavid P. Maher
    • David W. FaucherDaniel N. HeerMichael M. KaplanDavid P. Maher
    • H04Q3/545H04K1/00H04L9/10H04L9/14H04M11/00H04Q3/00H04L9/00H04M1/19H04N1/44
    • H04K1/00H04Q3/0016
    • A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.
    • 设置在连接主叫和被叫方的电信网络中的安全节点将以第一格式加密的信息(可以是语音,数据,传真,视频和其他类型的呼叫或消息)转换为(a)不同格式的加密信息, 到(b)非加密信息,反之亦然。 该节点可从连接到网络的任何位置访问。 通过路由由主叫方发起并通过安全节点发往被叫方的呼叫或消息,并向节点提供适当的控制信号,该信息可以仅在双方之间的传输路径的一部分上被加密,并且清除 传输路径的其余部分。 或者,可以使用不同的加密算法在路径的不同部分中加密该信息。 这种安排使得即使只有一方在始发或终端具有安全设备,或者如果各方具有使用不同的握手协议和加密算法的安全设备,则各方可以获得相对安全的通信。